Chapter 10

Authentication

Images

CERTIFICATION OBJECTIVES

10.01   Identifying Authentication Models

10.02   Authentication Protocols

10.03   Implementing Authentication

Images   Two-Minute Drill

Q&A   Self Test

An important consideration for all security programs is how approved individuals identify themselves to different systems and how that information is used to verify that the individuals are who they say they are. The process of verifying the identity of an individual is known as authentication. Before employees in an organization can gain access to ...

Get CompTIA Security+ Certification Study Guide, Third Edition (Exam SY0-501), 3rd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.